Cyber Posture

CVE-2025-24364

HighPublic PoC

Published: 27 January 2025

Published
27 January 2025
Modified
20 August 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0099 77.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-24364 is an arbitrary code execution vulnerability affecting vaultwarden, an unofficial Bitwarden-compatible server written in Rust and formerly known as bitwarden_rs. The flaw exists in the vaultwarden admin panel, where an authenticated attacker can leverage improper handling of mail agent settings and favicon images to execute arbitrary system commands. It is classified under CWE-74 (Improper Neutralization of Special Elements used in an SQL Command, though contextually related to command injection) with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impact.

An attacker requires authenticated access to the vaultwarden admin panel to exploit this vulnerability. The attack scenario involves modifying admin settings to configure sendmail as the mail agent while injecting a shell command, then crafting a malicious favicon image with embedded commands. Triggering the exploit, such as by sending a test email, causes the system to process the tampered favicon and execute the arbitrary code, potentially granting full system compromise.

The vulnerability was addressed in vaultwarden version 1.33.0. Security practitioners should update to this version or later. Additional details are available in the GitHub security advisory at https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4 and the release notes at https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0.

Details

CWE(s)
CWE-74

Affected Products

dani-garcia
vaultwarden
≤ 1.33.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability provides authenticated RCE in a public-facing web admin panel via command injection into mail settings and image processing, directly enabling T1190 for exploiting the exposed application and T1059.004 for Unix shell command execution leading to full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References